aboutsummaryrefslogtreecommitdiffstats
path: root/security/selinux
diff options
context:
space:
mode:
Diffstat (limited to 'security/selinux')
-rw-r--r--security/selinux/hooks.c65
1 files changed, 41 insertions, 24 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 21a592184633..91b06f2aa963 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -161,7 +161,7 @@ static int selinux_secmark_enabled(void)
161 */ 161 */
162static void cred_init_security(void) 162static void cred_init_security(void)
163{ 163{
164 struct cred *cred = (struct cred *) current->cred; 164 struct cred *cred = (struct cred *) current->real_cred;
165 struct task_security_struct *tsec; 165 struct task_security_struct *tsec;
166 166
167 tsec = kzalloc(sizeof(struct task_security_struct), GFP_KERNEL); 167 tsec = kzalloc(sizeof(struct task_security_struct), GFP_KERNEL);
@@ -184,7 +184,7 @@ static inline u32 cred_sid(const struct cred *cred)
184} 184}
185 185
186/* 186/*
187 * get the security ID of a task 187 * get the objective security ID of a task
188 */ 188 */
189static inline u32 task_sid(const struct task_struct *task) 189static inline u32 task_sid(const struct task_struct *task)
190{ 190{
@@ -197,7 +197,7 @@ static inline u32 task_sid(const struct task_struct *task)
197} 197}
198 198
199/* 199/*
200 * get the security ID of the current task 200 * get the subjective security ID of the current task
201 */ 201 */
202static inline u32 current_sid(void) 202static inline u32 current_sid(void)
203{ 203{
@@ -1395,6 +1395,7 @@ static int cred_has_perm(const struct cred *actor,
1395 * Check permission between a pair of tasks, e.g. signal checks, 1395 * Check permission between a pair of tasks, e.g. signal checks,
1396 * fork check, ptrace check, etc. 1396 * fork check, ptrace check, etc.
1397 * tsk1 is the actor and tsk2 is the target 1397 * tsk1 is the actor and tsk2 is the target
1398 * - this uses the default subjective creds of tsk1
1398 */ 1399 */
1399static int task_has_perm(const struct task_struct *tsk1, 1400static int task_has_perm(const struct task_struct *tsk1,
1400 const struct task_struct *tsk2, 1401 const struct task_struct *tsk2,
@@ -1410,6 +1411,22 @@ static int task_has_perm(const struct task_struct *tsk1,
1410 return avc_has_perm(sid1, sid2, SECCLASS_PROCESS, perms, NULL); 1411 return avc_has_perm(sid1, sid2, SECCLASS_PROCESS, perms, NULL);
1411} 1412}
1412 1413
1414/*
1415 * Check permission between current and another task, e.g. signal checks,
1416 * fork check, ptrace check, etc.
1417 * current is the actor and tsk2 is the target
1418 * - this uses current's subjective creds
1419 */
1420static int current_has_perm(const struct task_struct *tsk,
1421 u32 perms)
1422{
1423 u32 sid, tsid;
1424
1425 sid = current_sid();
1426 tsid = task_sid(tsk);
1427 return avc_has_perm(sid, tsid, SECCLASS_PROCESS, perms, NULL);
1428}
1429
1413#if CAP_LAST_CAP > 63 1430#if CAP_LAST_CAP > 63
1414#error Fix SELinux to handle capabilities > 63. 1431#error Fix SELinux to handle capabilities > 63.
1415#endif 1432#endif
@@ -1807,7 +1824,7 @@ static int selinux_ptrace_may_access(struct task_struct *child,
1807 return avc_has_perm(sid, csid, SECCLASS_FILE, FILE__READ, NULL); 1824 return avc_has_perm(sid, csid, SECCLASS_FILE, FILE__READ, NULL);
1808 } 1825 }
1809 1826
1810 return task_has_perm(current, child, PROCESS__PTRACE); 1827 return current_has_perm(child, PROCESS__PTRACE);
1811} 1828}
1812 1829
1813static int selinux_ptrace_traceme(struct task_struct *parent) 1830static int selinux_ptrace_traceme(struct task_struct *parent)
@@ -1826,7 +1843,7 @@ static int selinux_capget(struct task_struct *target, kernel_cap_t *effective,
1826{ 1843{
1827 int error; 1844 int error;
1828 1845
1829 error = task_has_perm(current, target, PROCESS__GETCAP); 1846 error = current_has_perm(target, PROCESS__GETCAP);
1830 if (error) 1847 if (error)
1831 return error; 1848 return error;
1832 1849
@@ -3071,7 +3088,7 @@ static int selinux_file_mprotect(struct vm_area_struct *vma,
3071 } else if (!vma->vm_file && 3088 } else if (!vma->vm_file &&
3072 vma->vm_start <= vma->vm_mm->start_stack && 3089 vma->vm_start <= vma->vm_mm->start_stack &&
3073 vma->vm_end >= vma->vm_mm->start_stack) { 3090 vma->vm_end >= vma->vm_mm->start_stack) {
3074 rc = task_has_perm(current, current, PROCESS__EXECSTACK); 3091 rc = current_has_perm(current, PROCESS__EXECSTACK);
3075 } else if (vma->vm_file && vma->anon_vma) { 3092 } else if (vma->vm_file && vma->anon_vma) {
3076 /* 3093 /*
3077 * We are making executable a file mapping that has 3094 * We are making executable a file mapping that has
@@ -3220,7 +3237,7 @@ static int selinux_task_create(unsigned long clone_flags)
3220 if (rc) 3237 if (rc)
3221 return rc; 3238 return rc;
3222 3239
3223 return task_has_perm(current, current, PROCESS__FORK); 3240 return current_has_perm(current, PROCESS__FORK);
3224} 3241}
3225 3242
3226/* 3243/*
@@ -3285,17 +3302,17 @@ static int selinux_task_setgid(gid_t id0, gid_t id1, gid_t id2, int flags)
3285 3302
3286static int selinux_task_setpgid(struct task_struct *p, pid_t pgid) 3303static int selinux_task_setpgid(struct task_struct *p, pid_t pgid)
3287{ 3304{
3288 return task_has_perm(current, p, PROCESS__SETPGID); 3305 return current_has_perm(p, PROCESS__SETPGID);
3289} 3306}
3290 3307
3291static int selinux_task_getpgid(struct task_struct *p) 3308static int selinux_task_getpgid(struct task_struct *p)
3292{ 3309{
3293 return task_has_perm(current, p, PROCESS__GETPGID); 3310 return current_has_perm(p, PROCESS__GETPGID);
3294} 3311}
3295 3312
3296static int selinux_task_getsid(struct task_struct *p) 3313static int selinux_task_getsid(struct task_struct *p)
3297{ 3314{
3298 return task_has_perm(current, p, PROCESS__GETSESSION); 3315 return current_has_perm(p, PROCESS__GETSESSION);
3299} 3316}
3300 3317
3301static void selinux_task_getsecid(struct task_struct *p, u32 *secid) 3318static void selinux_task_getsecid(struct task_struct *p, u32 *secid)
@@ -3317,7 +3334,7 @@ static int selinux_task_setnice(struct task_struct *p, int nice)
3317 if (rc) 3334 if (rc)
3318 return rc; 3335 return rc;
3319 3336
3320 return task_has_perm(current, p, PROCESS__SETSCHED); 3337 return current_has_perm(p, PROCESS__SETSCHED);
3321} 3338}
3322 3339
3323static int selinux_task_setioprio(struct task_struct *p, int ioprio) 3340static int selinux_task_setioprio(struct task_struct *p, int ioprio)
@@ -3328,12 +3345,12 @@ static int selinux_task_setioprio(struct task_struct *p, int ioprio)
3328 if (rc) 3345 if (rc)
3329 return rc; 3346 return rc;
3330 3347
3331 return task_has_perm(current, p, PROCESS__SETSCHED); 3348 return current_has_perm(p, PROCESS__SETSCHED);
3332} 3349}
3333 3350
3334static int selinux_task_getioprio(struct task_struct *p) 3351static int selinux_task_getioprio(struct task_struct *p)
3335{ 3352{
3336 return task_has_perm(current, p, PROCESS__GETSCHED); 3353 return current_has_perm(p, PROCESS__GETSCHED);
3337} 3354}
3338 3355
3339static int selinux_task_setrlimit(unsigned int resource, struct rlimit *new_rlim) 3356static int selinux_task_setrlimit(unsigned int resource, struct rlimit *new_rlim)
@@ -3350,7 +3367,7 @@ static int selinux_task_setrlimit(unsigned int resource, struct rlimit *new_rlim
3350 later be used as a safe reset point for the soft limit 3367 later be used as a safe reset point for the soft limit
3351 upon context transitions. See selinux_bprm_committing_creds. */ 3368 upon context transitions. See selinux_bprm_committing_creds. */
3352 if (old_rlim->rlim_max != new_rlim->rlim_max) 3369 if (old_rlim->rlim_max != new_rlim->rlim_max)
3353 return task_has_perm(current, current, PROCESS__SETRLIMIT); 3370 return current_has_perm(current, PROCESS__SETRLIMIT);
3354 3371
3355 return 0; 3372 return 0;
3356} 3373}
@@ -3363,17 +3380,17 @@ static int selinux_task_setscheduler(struct task_struct *p, int policy, struct s
3363 if (rc) 3380 if (rc)
3364 return rc; 3381 return rc;
3365 3382
3366 return task_has_perm(current, p, PROCESS__SETSCHED); 3383 return current_has_perm(p, PROCESS__SETSCHED);
3367} 3384}
3368 3385
3369static int selinux_task_getscheduler(struct task_struct *p) 3386static int selinux_task_getscheduler(struct task_struct *p)
3370{ 3387{
3371 return task_has_perm(current, p, PROCESS__GETSCHED); 3388 return current_has_perm(p, PROCESS__GETSCHED);
3372} 3389}
3373 3390
3374static int selinux_task_movememory(struct task_struct *p) 3391static int selinux_task_movememory(struct task_struct *p)
3375{ 3392{
3376 return task_has_perm(current, p, PROCESS__SETSCHED); 3393 return current_has_perm(p, PROCESS__SETSCHED);
3377} 3394}
3378 3395
3379static int selinux_task_kill(struct task_struct *p, struct siginfo *info, 3396static int selinux_task_kill(struct task_struct *p, struct siginfo *info,
@@ -3394,7 +3411,7 @@ static int selinux_task_kill(struct task_struct *p, struct siginfo *info,
3394 rc = avc_has_perm(secid, task_sid(p), 3411 rc = avc_has_perm(secid, task_sid(p),
3395 SECCLASS_PROCESS, perm, NULL); 3412 SECCLASS_PROCESS, perm, NULL);
3396 else 3413 else
3397 rc = task_has_perm(current, p, perm); 3414 rc = current_has_perm(p, perm);
3398 return rc; 3415 return rc;
3399} 3416}
3400 3417
@@ -5250,7 +5267,7 @@ static int selinux_getprocattr(struct task_struct *p,
5250 unsigned len; 5267 unsigned len;
5251 5268
5252 if (current != p) { 5269 if (current != p) {
5253 error = task_has_perm(current, p, PROCESS__GETATTR); 5270 error = current_has_perm(p, PROCESS__GETATTR);
5254 if (error) 5271 if (error)
5255 return error; 5272 return error;
5256 } 5273 }
@@ -5309,15 +5326,15 @@ static int selinux_setprocattr(struct task_struct *p,
5309 * above restriction is ever removed. 5326 * above restriction is ever removed.
5310 */ 5327 */
5311 if (!strcmp(name, "exec")) 5328 if (!strcmp(name, "exec"))
5312 error = task_has_perm(current, p, PROCESS__SETEXEC); 5329 error = current_has_perm(p, PROCESS__SETEXEC);
5313 else if (!strcmp(name, "fscreate")) 5330 else if (!strcmp(name, "fscreate"))
5314 error = task_has_perm(current, p, PROCESS__SETFSCREATE); 5331 error = current_has_perm(p, PROCESS__SETFSCREATE);
5315 else if (!strcmp(name, "keycreate")) 5332 else if (!strcmp(name, "keycreate"))
5316 error = task_has_perm(current, p, PROCESS__SETKEYCREATE); 5333 error = current_has_perm(p, PROCESS__SETKEYCREATE);
5317 else if (!strcmp(name, "sockcreate")) 5334 else if (!strcmp(name, "sockcreate"))
5318 error = task_has_perm(current, p, PROCESS__SETSOCKCREATE); 5335 error = current_has_perm(p, PROCESS__SETSOCKCREATE);
5319 else if (!strcmp(name, "current")) 5336 else if (!strcmp(name, "current"))
5320 error = task_has_perm(current, p, PROCESS__SETCURRENT); 5337 error = current_has_perm(p, PROCESS__SETCURRENT);
5321 else 5338 else
5322 error = -EINVAL; 5339 error = -EINVAL;
5323 if (error) 5340 if (error)